Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 22:53
Static task
static1
Behavioral task
behavioral1
Sample
Lutrix.exe
Resource
win7-20230220-en
General
-
Target
Lutrix.exe
-
Size
4.5MB
-
MD5
8a0dfeea924d5faf4025d9ac7aa393a4
-
SHA1
1da14c08a5f6c6b7efc4ddf4ba8087de7578c1e4
-
SHA256
2c329e073c0332b62859ee25d3953388d521961a5731d43633a948459c2a80fc
-
SHA512
b4b752d2b16616f62074890ed5483f5944cf5d578ba5d802da2eafa1c550e2595e87245ad91d93ec7a7401980efe885065f08d5e58d41889778c08b52c978361
-
SSDEEP
49152:jjk7QkVV6AtEz7BYU8+/391+SUAx5lPqy4U/m4HccJYAYbEr8vzTwSgO79Ku:jjk7StYUjvllq4/mZ1AYbEr8F
Malware Config
Extracted
lumma
45.9.74.78
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
CfHyZ4Bmoi.exepid process 3688 CfHyZ4Bmoi.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
CfHyZ4Bmoi.exedescription pid process target process PID 3688 set thread context of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Lutrix.exepid process 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe 4268 Lutrix.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Lutrix.exeCfHyZ4Bmoi.exedescription pid process target process PID 4268 wrote to memory of 3688 4268 Lutrix.exe CfHyZ4Bmoi.exe PID 4268 wrote to memory of 3688 4268 Lutrix.exe CfHyZ4Bmoi.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe PID 3688 wrote to memory of 3308 3688 CfHyZ4Bmoi.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lutrix.exe"C:\Users\Admin\AppData\Local\Temp\Lutrix.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Public\CfHyZ4Bmoi.exeC:/Users/Public/CfHyZ4Bmoi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\CfHyZ4Bmoi.exeFilesize
1.7MB
MD5b329525d2d62f10d7a8fdb25bb9d9a43
SHA143190e85312bd69cda8c094a0085ea188832bbbc
SHA256e7cf16e7e4fac1aafb98e10b36c5b129df9a372d03bdebcc5cb77f7bb1139be7
SHA512053f1ff542bf1ac0bbbfc4f320c62cc5b63092f7ff0b882c0d7d8bf7b3a3609c42b817d2d527f9f8841035d5883eea91676b93fbc60779d68d119ee1e1460ad1
-
C:\Users\Public\CfHyZ4Bmoi.exeFilesize
1.7MB
MD5b329525d2d62f10d7a8fdb25bb9d9a43
SHA143190e85312bd69cda8c094a0085ea188832bbbc
SHA256e7cf16e7e4fac1aafb98e10b36c5b129df9a372d03bdebcc5cb77f7bb1139be7
SHA512053f1ff542bf1ac0bbbfc4f320c62cc5b63092f7ff0b882c0d7d8bf7b3a3609c42b817d2d527f9f8841035d5883eea91676b93fbc60779d68d119ee1e1460ad1
-
memory/3308-149-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/3308-150-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/3308-146-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/3308-148-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/3688-145-0x0000000000900000-0x0000000000AB6000-memory.dmpFilesize
1.7MB
-
memory/4268-133-0x0000000002A50000-0x0000000002A51000-memory.dmpFilesize
4KB
-
memory/4268-151-0x0000000000400000-0x0000000000889000-memory.dmpFilesize
4.5MB
-
memory/4268-153-0x0000000000400000-0x0000000000889000-memory.dmpFilesize
4.5MB
-
memory/4268-163-0x0000000000400000-0x0000000000889000-memory.dmpFilesize
4.5MB
-
memory/4268-165-0x0000000000400000-0x0000000000889000-memory.dmpFilesize
4.5MB
-
memory/4268-171-0x0000000000400000-0x0000000000889000-memory.dmpFilesize
4.5MB